SlideShare a Scribd company logo
1 of 3
Dwayne and Debbie Tamai Family of Emeryville, Ontario.
Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic
harassment involved 15-year-old son, Billy, who took control of
all of the electronic devices in the family's home, including the
phone, and manipulated them to the distress of other family
members for his own amusement. The incidents began in
December 1996, when friends of the family complained that
phone calls to the Tamai home were repeatedly being waylaid,
cut off missed messages, strange clicking and appears like a
minor with a disembodied voice, unnervingly distorted by
computer, who interrupted calls to make himself known.
After burping repeatedly, the caller frightened Mr. and Mrs.
Tamai, and stated that I know who you are, and I stole your
voice mail. Mocking, sometimes menacing, the high-tech stalker
became a constant presence, eavesdropping on family
conversations, switching TV channels, and shutting off the
electricity.
The police department confirmed that the sabotage was an
inside activity but refrain from releasing the name the culprit.
The police further stated that nothing would be gained by filing
charges against the suspect. Mr. Dwayne and Mrs. Debbie
Tamai asserted that their son, Billy, had admitted engaging in
the mysterious calls. The interruptions included burps,
blathering and claims having control over the inner workings of
the Tamai’s custom-built home, and the power to turn individual
appliances on and off via remote control.
It started off as a witticism with friends and got out of control
to an extent that he didn't know how to end the entire operation,
become afraid to come forward and tell the parents for the fear
of us disowning him.
On Saturday, Mr., and Mrs. Tamai get organized and planned to
take their son to the police department to defend him against
persistent rumors on him. Instead, Mr., and Mrs. Tamai’s son
confessed and labelled an intruder code-named, Sommy. Mr.,
and Mrs. Tamai eliminated all external sources and had
confidence in interior sources. After 2-days, a team of
investigators, intelligence and security experts loaded with
high-tech equipment failed to locate Sommy. The next day, the
team brought in two television networks to assist in the process.
In conclusion, the son, Billy not (Sommy) contacted the
victims; (his biological parents), launched verbal threats in
combination with the electronic harassment, in an effort to
demonstrate his power and authority over them. The best option
was, Mr., and Mrs. Tamai victims were not physically harmed,
but terrified and greatly inconvenienced by the fact that the
unknown force appeared to have control over a great many
aspects of their lives, and the unknown force turned out to be
their biological son, Billy.
Scenario:
1
Criminal motive is connected to emotional, psychological, and
material need are often impel by means of behavior and
independent of technology operation. These criminal tendencies
are believed to champion the restoration of the criminal's self-
confidence, and self-worth which lead criminals to the path of
temporary gratification, inadequacy, and incompetence.
Question 1
1:1 Provide a comprehensive narrative of Billy’s competency
and creating emotional distress on his parents.
1:2 Identify the role of Sommy in this operation
Scenario 2
The police department confirmed that the sabotage was an
inside activity but refrain from releasing the name the culprit.
The police further stated that nothing would be gained by filing
charges against the suspect.
2:1 What level of criminal behavior was exhibited by Billy in
this operation?
2:2 The entire operation is classified as a serious domestic
problem, why didn’t the police officer file charges against the
suspect?
Scenario 3
3:1 Modern approach use computer and internet technologies
identify offender
modus operandi
, criminal intent, and motive.
3:2 Describe the impact of computer and internet technologies
of Billy MO and criminal motive in this situation.

More Related Content

Similar to Dwayne and Debbie Tamai Family of Emeryville, Ontario.Mr. Dw.docx

7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINTmattyp99
 
DIGITAL BULLYING C&E.pptx
DIGITAL BULLYING C&E.pptxDIGITAL BULLYING C&E.pptx
DIGITAL BULLYING C&E.pptxFredrick Ajode
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)forensicsnation
 
CJUS343-1302B-03 P5IPP5IP .docx
CJUS343-1302B-03 P5IPP5IP                                       .docxCJUS343-1302B-03 P5IPP5IP                                       .docx
CJUS343-1302B-03 P5IPP5IP .docxmonicafrancis71118
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
Waxman emails to judy 2011
Waxman emails to judy 2011Waxman emails to judy 2011
Waxman emails to judy 2011DocumentsforMila
 
Waxman emails to judy 2011
Waxman emails to judy 2011Waxman emails to judy 2011
Waxman emails to judy 2011DocumentsforMila
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdfaesalem06
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
Top 5 digital forensic court cases
Top 5 digital forensic court casesTop 5 digital forensic court cases
Top 5 digital forensic court casesDeadbolt Forensics
 
2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)Felipe Prado
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Keeping Kids Safe Online
Keeping Kids Safe OnlineKeeping Kids Safe Online
Keeping Kids Safe OnlineNatalie Andrews
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 

Similar to Dwayne and Debbie Tamai Family of Emeryville, Ontario.Mr. Dw.docx (20)

7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT7 MEDIA AND CRIME POWERPOINT
7 MEDIA AND CRIME POWERPOINT
 
DIGITAL BULLYING C&E.pptx
DIGITAL BULLYING C&E.pptxDIGITAL BULLYING C&E.pptx
DIGITAL BULLYING C&E.pptx
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
CJUS343-1302B-03 P5IPP5IP .docx
CJUS343-1302B-03 P5IPP5IP                                       .docxCJUS343-1302B-03 P5IPP5IP                                       .docx
CJUS343-1302B-03 P5IPP5IP .docx
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
Waxman emails to judy 2011
Waxman emails to judy 2011Waxman emails to judy 2011
Waxman emails to judy 2011
 
Waxman emails to judy 2011
Waxman emails to judy 2011Waxman emails to judy 2011
Waxman emails to judy 2011
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Top 5 digital forensic court cases
Top 5 digital forensic court casesTop 5 digital forensic court cases
Top 5 digital forensic court cases
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)2600 v12 n2 (summer 1995)
2600 v12 n2 (summer 1995)
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Keeping Kids Safe Online
Keeping Kids Safe OnlineKeeping Kids Safe Online
Keeping Kids Safe Online
 
Ethical Decision Making
Ethical Decision MakingEthical Decision Making
Ethical Decision Making
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

More from brownliecarmella

E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docx
E C O N F O C U S   T H I R D Q U A R T E R   2 0 1 3 31.docxE C O N F O C U S   T H I R D Q U A R T E R   2 0 1 3 31.docx
E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docxbrownliecarmella
 
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docx
E B B 3 5 9  –  E B B S  P o r t f o l i o  V  C o u r.docxE B B 3 5 9  –  E B B S  P o r t f o l i o  V  C o u r.docx
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docxbrownliecarmella
 
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docxe activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docxbrownliecarmella
 
Dynamics of Human Service Program ManagementIndividuals who .docx
Dynamics of Human Service Program ManagementIndividuals who .docxDynamics of Human Service Program ManagementIndividuals who .docx
Dynamics of Human Service Program ManagementIndividuals who .docxbrownliecarmella
 
Dynamic Postural Assessment Name _____________________.docx
Dynamic Postural Assessment Name _____________________.docxDynamic Postural Assessment Name _____________________.docx
Dynamic Postural Assessment Name _____________________.docxbrownliecarmella
 
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docxDylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docxbrownliecarmella
 
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docxDustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docxbrownliecarmella
 
DWPM    71713  1  543707.1  MEMBERSHIP A.docx
DWPM    71713  1  543707.1  MEMBERSHIP A.docxDWPM    71713  1  543707.1  MEMBERSHIP A.docx
DWPM    71713  1  543707.1  MEMBERSHIP A.docxbrownliecarmella
 
DwightEvaluation       Leadership style assessments certainl.docx
DwightEvaluation       Leadership style assessments certainl.docxDwightEvaluation       Leadership style assessments certainl.docx
DwightEvaluation       Leadership style assessments certainl.docxbrownliecarmella
 
Dwight Waldo is known for his work on the rise of the administrative.docx
Dwight Waldo is known for his work on the rise of the administrative.docxDwight Waldo is known for his work on the rise of the administrative.docx
Dwight Waldo is known for his work on the rise of the administrative.docxbrownliecarmella
 
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docxDVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docxbrownliecarmella
 
Dusk of DawnDiscussion questions1. Explain when we call fo.docx
Dusk of DawnDiscussion questions1. Explain when we call fo.docxDusk of DawnDiscussion questions1. Explain when we call fo.docx
Dusk of DawnDiscussion questions1. Explain when we call fo.docxbrownliecarmella
 
Durst et al. (2014) describe the burden that some Romani experience .docx
Durst et al. (2014) describe the burden that some Romani experience .docxDurst et al. (2014) describe the burden that some Romani experience .docx
Durst et al. (2014) describe the burden that some Romani experience .docxbrownliecarmella
 
DuringWeek 4, we will shift our attention to the legislative.docx
DuringWeek 4, we will shift our attention to the legislative.docxDuringWeek 4, we will shift our attention to the legislative.docx
DuringWeek 4, we will shift our attention to the legislative.docxbrownliecarmella
 
DuringWeek 3, we will examine agenda setting in more depth w.docx
DuringWeek 3, we will examine agenda setting in more depth w.docxDuringWeek 3, we will examine agenda setting in more depth w.docx
DuringWeek 3, we will examine agenda setting in more depth w.docxbrownliecarmella
 
During  the course of this class you have learned that Latin Ameri.docx
During  the course of this class you have learned that Latin Ameri.docxDuring  the course of this class you have learned that Latin Ameri.docx
During  the course of this class you have learned that Latin Ameri.docxbrownliecarmella
 
During WW II, the Polish resistance obtained the German encoding mac.docx
During WW II, the Polish resistance obtained the German encoding mac.docxDuring WW II, the Polish resistance obtained the German encoding mac.docx
During WW II, the Polish resistance obtained the German encoding mac.docxbrownliecarmella
 
During Week 5, we studied social stratification and how it influence.docx
During Week 5, we studied social stratification and how it influence.docxDuring Week 5, we studied social stratification and how it influence.docx
During Week 5, we studied social stratification and how it influence.docxbrownliecarmella
 
During this week you worked with the main concepts of Set Theory. Ch.docx
During this week you worked with the main concepts of Set Theory. Ch.docxDuring this week you worked with the main concepts of Set Theory. Ch.docx
During this week you worked with the main concepts of Set Theory. Ch.docxbrownliecarmella
 
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docxEach answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docxbrownliecarmella
 

More from brownliecarmella (20)

E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docx
E C O N F O C U S   T H I R D Q U A R T E R   2 0 1 3 31.docxE C O N F O C U S   T H I R D Q U A R T E R   2 0 1 3 31.docx
E C O N F O C U S T H I R D Q U A R T E R 2 0 1 3 31.docx
 
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docx
E B B 3 5 9  –  E B B S  P o r t f o l i o  V  C o u r.docxE B B 3 5 9  –  E B B S  P o r t f o l i o  V  C o u r.docx
E B B 3 5 9 – E B B S P o r t f o l i o V C o u r.docx
 
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docxe activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
e activityhttpsblackboard.strayer.edubbcswebdavinstitutionBU.docx
 
Dynamics of Human Service Program ManagementIndividuals who .docx
Dynamics of Human Service Program ManagementIndividuals who .docxDynamics of Human Service Program ManagementIndividuals who .docx
Dynamics of Human Service Program ManagementIndividuals who .docx
 
Dynamic Postural Assessment Name _____________________.docx
Dynamic Postural Assessment Name _____________________.docxDynamic Postural Assessment Name _____________________.docx
Dynamic Postural Assessment Name _____________________.docx
 
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docxDylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
Dylan (age 45, Caucasian) is a heroin addict who has been in and o.docx
 
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docxDustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
Dustin,A case study is defined by Saunders, Lewis, and Thornhi.docx
 
DWPM    71713  1  543707.1  MEMBERSHIP A.docx
DWPM    71713  1  543707.1  MEMBERSHIP A.docxDWPM    71713  1  543707.1  MEMBERSHIP A.docx
DWPM    71713  1  543707.1  MEMBERSHIP A.docx
 
DwightEvaluation       Leadership style assessments certainl.docx
DwightEvaluation       Leadership style assessments certainl.docxDwightEvaluation       Leadership style assessments certainl.docx
DwightEvaluation       Leadership style assessments certainl.docx
 
Dwight Waldo is known for his work on the rise of the administrative.docx
Dwight Waldo is known for his work on the rise of the administrative.docxDwight Waldo is known for his work on the rise of the administrative.docx
Dwight Waldo is known for his work on the rise of the administrative.docx
 
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docxDVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
DVWASetting up DAMN VULNERABLE WEB APPLICATIONSDam.docx
 
Dusk of DawnDiscussion questions1. Explain when we call fo.docx
Dusk of DawnDiscussion questions1. Explain when we call fo.docxDusk of DawnDiscussion questions1. Explain when we call fo.docx
Dusk of DawnDiscussion questions1. Explain when we call fo.docx
 
Durst et al. (2014) describe the burden that some Romani experience .docx
Durst et al. (2014) describe the burden that some Romani experience .docxDurst et al. (2014) describe the burden that some Romani experience .docx
Durst et al. (2014) describe the burden that some Romani experience .docx
 
DuringWeek 4, we will shift our attention to the legislative.docx
DuringWeek 4, we will shift our attention to the legislative.docxDuringWeek 4, we will shift our attention to the legislative.docx
DuringWeek 4, we will shift our attention to the legislative.docx
 
DuringWeek 3, we will examine agenda setting in more depth w.docx
DuringWeek 3, we will examine agenda setting in more depth w.docxDuringWeek 3, we will examine agenda setting in more depth w.docx
DuringWeek 3, we will examine agenda setting in more depth w.docx
 
During  the course of this class you have learned that Latin Ameri.docx
During  the course of this class you have learned that Latin Ameri.docxDuring  the course of this class you have learned that Latin Ameri.docx
During  the course of this class you have learned that Latin Ameri.docx
 
During WW II, the Polish resistance obtained the German encoding mac.docx
During WW II, the Polish resistance obtained the German encoding mac.docxDuring WW II, the Polish resistance obtained the German encoding mac.docx
During WW II, the Polish resistance obtained the German encoding mac.docx
 
During Week 5, we studied social stratification and how it influence.docx
During Week 5, we studied social stratification and how it influence.docxDuring Week 5, we studied social stratification and how it influence.docx
During Week 5, we studied social stratification and how it influence.docx
 
During this week you worked with the main concepts of Set Theory. Ch.docx
During this week you worked with the main concepts of Set Theory. Ch.docxDuring this week you worked with the main concepts of Set Theory. Ch.docx
During this week you worked with the main concepts of Set Theory. Ch.docx
 
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docxEach answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
Each answer should be at least 200 words.  Due in 24 hours. No Plagi.docx
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Dwayne and Debbie Tamai Family of Emeryville, Ontario.Mr. Dw.docx

  • 1. Dwayne and Debbie Tamai Family of Emeryville, Ontario. Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic harassment involved 15-year-old son, Billy, who took control of all of the electronic devices in the family's home, including the phone, and manipulated them to the distress of other family members for his own amusement. The incidents began in December 1996, when friends of the family complained that phone calls to the Tamai home were repeatedly being waylaid, cut off missed messages, strange clicking and appears like a minor with a disembodied voice, unnervingly distorted by computer, who interrupted calls to make himself known. After burping repeatedly, the caller frightened Mr. and Mrs. Tamai, and stated that I know who you are, and I stole your voice mail. Mocking, sometimes menacing, the high-tech stalker became a constant presence, eavesdropping on family conversations, switching TV channels, and shutting off the electricity. The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. Mr. Dwayne and Mrs. Debbie Tamai asserted that their son, Billy, had admitted engaging in the mysterious calls. The interruptions included burps, blathering and claims having control over the inner workings of the Tamai’s custom-built home, and the power to turn individual appliances on and off via remote control. It started off as a witticism with friends and got out of control to an extent that he didn't know how to end the entire operation, become afraid to come forward and tell the parents for the fear
  • 2. of us disowning him. On Saturday, Mr., and Mrs. Tamai get organized and planned to take their son to the police department to defend him against persistent rumors on him. Instead, Mr., and Mrs. Tamai’s son confessed and labelled an intruder code-named, Sommy. Mr., and Mrs. Tamai eliminated all external sources and had confidence in interior sources. After 2-days, a team of investigators, intelligence and security experts loaded with high-tech equipment failed to locate Sommy. The next day, the team brought in two television networks to assist in the process. In conclusion, the son, Billy not (Sommy) contacted the victims; (his biological parents), launched verbal threats in combination with the electronic harassment, in an effort to demonstrate his power and authority over them. The best option was, Mr., and Mrs. Tamai victims were not physically harmed, but terrified and greatly inconvenienced by the fact that the unknown force appeared to have control over a great many aspects of their lives, and the unknown force turned out to be their biological son, Billy. Scenario: 1 Criminal motive is connected to emotional, psychological, and material need are often impel by means of behavior and independent of technology operation. These criminal tendencies are believed to champion the restoration of the criminal's self- confidence, and self-worth which lead criminals to the path of temporary gratification, inadequacy, and incompetence. Question 1 1:1 Provide a comprehensive narrative of Billy’s competency
  • 3. and creating emotional distress on his parents. 1:2 Identify the role of Sommy in this operation Scenario 2 The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. 2:1 What level of criminal behavior was exhibited by Billy in this operation? 2:2 The entire operation is classified as a serious domestic problem, why didn’t the police officer file charges against the suspect? Scenario 3 3:1 Modern approach use computer and internet technologies identify offender modus operandi , criminal intent, and motive. 3:2 Describe the impact of computer and internet technologies of Billy MO and criminal motive in this situation.